CN111355578A - Public key encryption and decryption method and system with double monitoring parties - Google Patents

Public key encryption and decryption method and system with double monitoring parties Download PDF

Info

Publication number
CN111355578A
CN111355578A CN202010182334.0A CN202010182334A CN111355578A CN 111355578 A CN111355578 A CN 111355578A CN 202010182334 A CN202010182334 A CN 202010182334A CN 111355578 A CN111355578 A CN 111355578A
Authority
CN
China
Prior art keywords
administrator
public
key
public key
random number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010182334.0A
Other languages
Chinese (zh)
Other versions
CN111355578B (en
Inventor
赵峰
何畅彬
钟林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Chain Technology Co ltd
Original Assignee
Beijing Chain Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Chain Technology Co ltd filed Critical Beijing Chain Technology Co ltd
Priority to CN202010182334.0A priority Critical patent/CN111355578B/en
Publication of CN111355578A publication Critical patent/CN111355578A/en
Application granted granted Critical
Publication of CN111355578B publication Critical patent/CN111355578B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a public key encryption and decryption method and system with double monitoring parties, wherein the method comprises the following steps: the sender, the receiver, the first administrator and the second administrator respectively generate respective private keys and public keys according to the system public parameters; the sender adopts an encryption algorithm and encrypts according to the system public parameters, the private key of the sender, the public key of the first administrator and the public key of the second administrator to generate a ciphertext; the receiver decrypts by adopting a decryption algorithm according to the system public parameter, the ciphertext and the private key of the receiver to generate a message; a first administrator generates a message according to a system public parameter, a public key of a sender, a private key of the first administrator, a ciphertext, a public key of a receiver and a public key of a second administrator by adopting a supervision algorithm; the second administrator adopts a supervision algorithm to generate messages according to the system public parameters, the ciphertext and the private key of the second administrator, so that strict supervision of the double supervisors is realized, and the supervision problem in the digital currency system is solved.

Description

Public key encryption and decryption method and system with double monitoring parties
Technical Field
The invention relates to the technical field of encryption and decryption, in particular to a public key encryption and decryption method and system with double monitoring parties.
Background
In cryptographic systems, users desire that their data possess as high a privacy and privacy protection as possible, while administrators desire to be able to strictly supervise user data to prevent malicious users or illegal activities. Thus, privacy protection and strict supervision appear to be irreconcilable contradictions in cryptographic systems.
Protecting user privacy has great application requirements. For example, apple corporation has high protection on user privacy, has a large amount of user registration and uploads private data to an apple cloud service system, but many domestic users refuse the requirements of hundreds of websites and the like on data requests of users. Similarly, researchers have found that blockchain based cryptosystems, such as bitcoins, have poor privacy protection.
In bitcoin systems, although the address is disposable per transaction, the two transaction sheets can be linked so that the user's transaction chain is discovered through statistics. In addition, the user usually needs a change address, and the balance is paid to the change address for each transaction, so that the user can be tracked through the change address. Therefore, in order to resist transaction address chaining, researchers have proposed the menlo and zero coins. The address is mixed in a plurality of addresses by the menou coin through the ring signature, so that the probability of carrying out transaction address chaining by an attacker is reduced to 1/n, wherein n is the number of public keys used by the ring signature. Similarly, the zero currency directly uses a zero knowledge proof protocol to prove that the addresses contained in the two ciphertext words have consistency, so that the transaction has almost no linkability, thereby realizing high privacy protection of the user.
However, in the digital currency category, if a user can make a malicious transaction at will without collecting a transaction fee, the user is likely to make a malicious transaction or crime of money laundering. Therefore, strict supervision of user data is required. However, only the recipient can decrypt the ciphertext message, and the administrator cannot decrypt, in current public key encryption schemes. According to the existing public key encryption scheme, if supervision needs to be implemented, a sender is required to encrypt data using a public key of an administrator, encrypt data using a public key of a receiver, and then prove that a message obtained by the administrator and a message obtained by the receiver are equal using a zero-knowledge proof protocol. The process uses two times of encryption and one time of zero knowledge proof protocol, and has low efficiency and no practicability.
Similarly, if an administrator distributes keys to users using a hierarchical key distribution protocol, the administrator can decrypt the ciphertext message using the user's private key. However, in the hierarchical key distribution process, the administrator knows the private key of the user. In a digital money system, there is a typical act of hacking, in which an administrator spends money owned by a user using the user's private key. Therefore, knowing the user's private key by the administrator would render the user's assets insecure.
Therefore, at present, there is no solution to the problem between user privacy protection and strict supervision in the public key cryptosystem, which is very important in the field of digital currency and the like. The existing digital currency system can solve criminal behaviors such as money laundering and malicious payment only by strict supervision. Therefore, a public key encryption scheme with dual supervisors is urgently needed to be researched.
Disclosure of Invention
Based on this, the invention aims to provide a public key encryption and decryption method and system with double supervisors, so as to realize strict supervision of the double supervisors and solve the supervision problem in a digital currency system.
In order to achieve the above object, the present invention provides a public key encryption and decryption method with dual supervisors, wherein the method comprises:
step S1: the first administrator generates system public parameters according to the security parameters;
step S2: the sender, the receiver, the first administrator and the second administrator respectively generate respective private keys and public keys according to the system public parameters;
step S3: the sender adopts an encryption algorithm and encrypts according to the system public parameters, the private key of the sender, the public key of the first administrator and the public key of the second administrator to generate a ciphertext;
step S4: the receiver decrypts by adopting a decryption algorithm according to the system public parameter, the ciphertext and the private key of the receiver to generate a message;
step S5: a first administrator generates a message according to a system public parameter, a public key of a sender, a private key of the first administrator, a ciphertext, a public key of a receiver and a public key of a second administrator by adopting a supervision algorithm;
step S6: and the second administrator adopts a supervision algorithm to generate a message according to the system public parameter, the ciphertext and the private key of the second administrator.
Optionally, the sending party, the receiving party, the first administrator and the second administrator respectively generate their own private keys and public keys according to the system public parameters, and the method specifically includes:
step S21: the sender adopts a secret key generation algorithm, and a private key and a public key of the sender are determined according to the system public parameter and the first secret random number;
step S22: the receiver adopts a secret key generation algorithm, and determines a private key and a public key of the receiver according to the system public parameter and the second secret random number;
step S23: the first administrator determines a private key and a public key of the first administrator according to the system public parameter and the third secret random number by adopting a secret key generation algorithm;
step S24: and the second administrator determines a private key and a public key of the second management according to the system public parameter and the fourth secret random number by adopting a secret key generation algorithm.
Optionally, the sending party uses an encryption algorithm to encrypt according to the system public parameter, the private key of the sending party, the public key of the first administrator and the public key of the second administrator, so as to generate a ciphertext, and the method specifically includes:
step S31: generating a fifth secret random number according to the system public parameter, the public random number, the private key of the sender and the public key of the first administrator;
step S32: and encrypting by adopting an encryption algorithm according to the system public parameter, the message, the fifth secret random number, the public key of the second administrator and the public key of the receiver to generate a ciphertext.
Optionally, the first administrator generates a message according to the system public parameter, the public key of the sender, the private key of the first administrator, the ciphertext, the public key of the receiver, and the public key of the second administrator by using a supervision algorithm, which specifically includes:
step S51: generating a fifth secret random number according to the system public parameter, the public random number, the public key of the sender and the private key of the first administrator;
step S52: and generating a message by adopting a supervision algorithm according to the system public parameter, the fifth secret random number, the ciphertext, the public key of the receiver and the public key of the second administrator.
Or step S51: generating a fifth secret random number according to the system public parameter, the first local ciphertext in the ciphertext, the public key of the sender and the private key of the first administrator;
step S52: and generating a message by adopting a supervision algorithm according to the system public parameter, the fifth secret random number, the fourth local ciphertext in the ciphertext, the public key of the receiver and the public key of the second administrator.
The invention also provides a public key encryption and decryption system with double supervisors, which comprises:
the system public parameter determining module is used for generating a system public parameter by a first administrator according to the security parameter;
the secret key generation module is used for generating a private key and a public key of each of the sender, the receiver, the first administrator and the second administrator according to the system public parameters;
the encryption module is used for encrypting by the sender according to the system public parameter, the private key of the sender, the public key of the first administrator and the public key of the second administrator by adopting an encryption algorithm to generate a ciphertext;
the decryption module is used for decrypting by the receiver according to the system public parameter, the ciphertext and the private key of the receiver by adopting a decryption algorithm to generate a message;
the first message generation module is used for generating a message by a first administrator according to the system public parameter, the public key of the sender, the private key of the first administrator, the ciphertext, the public key of the receiver and the public key of a second administrator by adopting a supervision algorithm;
and the second message generation module is used for generating a message according to the system public parameter, the ciphertext and the private key of the second administrator by adopting a supervision algorithm.
Optionally, the key generating module specifically includes:
the first secret key generation unit is used for determining a private key and a public key of the sender according to the system public parameter and the first secret random number by adopting a secret key generation algorithm;
the second secret key generation unit is used for determining a private key and a public key of the receiver according to the system public parameter and the second secret random number by adopting a secret key generation algorithm;
the third secret key generation unit is used for determining a private key and a public key of the first administrator according to the system public parameter and the third secret random number by adopting a secret key generation algorithm by the first administrator;
and the fourth secret key generation unit is used for determining a private key and a public key of the second management according to the system public parameter and the fourth secret random number by adopting a secret key generation algorithm by the second administrator.
Optionally, the encryption module specifically includes:
the first secret random number generating unit is used for generating a fifth secret random number according to the system public parameter, the public random number, the private key of the sender and the public key of the first administrator;
and the encryption unit is used for encrypting according to the system public parameter, the message, the fifth secret random number, the public key of the second administrator and the public key of the receiver by adopting an encryption algorithm to generate a ciphertext.
Optionally, the first message generating module specifically includes:
the second secret random number generation unit is used for generating a fifth secret random number according to the system public parameter, the public random number, the public key of the sender and the private key of the first administrator;
and the first message generation unit is used for generating a message according to the system public parameter, the fifth secret random number, the ciphertext, the public key of the receiver and the public key of the second administrator by adopting a supervision algorithm.
Or a second secret random number generation unit, configured to generate a fifth secret random number according to the system public parameter, the first local ciphertext in the ciphertext, the public key of the sender, and the private key of the first administrator;
and the first message generation unit is used for generating a message according to the system public parameter, the fifth secret random number, the fourth local ciphertext in the ciphertext, the public key of the receiver and the public key of the second administrator by adopting a supervision algorithm.
According to the specific embodiment provided by the invention, the invention discloses the following technical effects:
the invention provides a public key encryption and decryption method and system with double monitoring parties, wherein the method comprises the following steps: the sender, the receiver, the first administrator and the second administrator respectively generate respective private keys and public keys according to the system public parameters; the sender adopts an encryption algorithm and encrypts according to the system public parameters, the private key of the sender, the public key of the first administrator and the public key of the second administrator to generate a ciphertext; the receiver decrypts by adopting a decryption algorithm according to the system public parameter, the ciphertext and the private key of the receiver to generate a message; a first administrator generates a message according to a system public parameter, a public key of a sender, a private key of the first administrator, a ciphertext, a public key of a receiver and a public key of a second administrator by adopting a supervision algorithm; the second administrator adopts a supervision algorithm to generate messages according to the system public parameters, the ciphertext and the private key of the second administrator, so that strict supervision of the double supervisors is realized, and the supervision problem in the digital currency system is solved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings without inventive exercise.
FIG. 1 is a flowchart of a public key encryption/decryption method with dual supervisors according to an embodiment of the present invention;
fig. 2 is a block diagram of a public key encryption/decryption system with dual supervisors according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention aims to provide a public key encryption and decryption method and system with double supervisors, which realize strict supervision of the double supervisors and solve the supervision problem in a digital currency system.
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in further detail below.
Fig. 1 is a flowchart of a public key encryption and decryption method with dual supervisors according to an embodiment of the present invention, and as shown in fig. 1, the present invention discloses a public key encryption and decryption method with dual supervisors, where the method includes:
step S1: and the first administrator generates system public parameters according to the safety parameters.
Step S2: and the sender, the receiver, the first administrator and the second administrator respectively generate respective private keys and public keys according to the system public parameters.
Step S3: and the sender adopts an encryption algorithm and encrypts according to the system public parameters, the private key of the sender, the public key of the first administrator and the public key of the second administrator to generate a ciphertext.
Step S4: and the receiver decrypts by adopting a decryption algorithm according to the system public parameter, the ciphertext and the private key of the receiver to generate the message.
Step S5: and the first administrator adopts a supervision algorithm to generate a message according to the system public parameters, the public key of the sender, the private key of the first administrator, the ciphertext, the public key of the receiver and the public key of the second administrator.
Step S6: and the second administrator adopts a supervision algorithm to generate a message according to the system public parameter, the ciphertext and the private key of the second administrator.
The following is illustrated by way of example:
example one
Step S1: the first administrator generates system public parameters according to the safety parameters, and the specific formula is as follows:
Param←Initialize(1λ);
wherein 1 isλFor security parameters, Initialize is the initialization algorithm, Param is the system common parameter, Param ═ e, G, H1,H2G × G → GTThe generator of the group G is G, and the hash function H1:{0,1}2n→{0,1}n(ii) a Hash function H2:GT→{0,1}n
Step S2: the method comprises the following steps that a sender, a receiver, a first administrator and a second administrator respectively generate respective private keys and public keys according to system public parameters, and specifically comprises the following steps:
step S21: the sender adopts a secret key generation algorithm, and determines a private key and a public key of the sender according to the system public parameter and the first secret random number, wherein the specific formula is as follows:
(SK1,PK1)←KGen(Param,a);
wherein, KGen is a secret key generation algorithm, Param is a system public parameter, a is a first secret random number,
Figure BDA0002413001960000061
SK1is the private key, PK, of the sender1Is the public key of the sender.
Step S22: the receiver adopts a secret key generation algorithm, and determines a private key SK of the receiver according to the system public parameter and the second secret random number2And public key PK2The concrete formula is as follows:
(SK2,PK2)←KGen(Param,b);
wherein KGen is a secret key generation algorithm, Param is a system public parameter, b is a second secret random number,
Figure BDA0002413001960000071
SK2is a private key, PK, of the receiving party2Is the public key of the recipient.
Step S23: the first administrator determines a private key and a public key of the first administrator according to the system public parameter and the third secret random number by adopting a secret key generation algorithm, and the specific formula is as follows:
(SK3,PK3)←KGen(Param,α);
wherein, KGen is a secret key generation algorithm, Param is a system public parameter, α is a third secret random number,
Figure BDA0002413001960000072
SK3is a private key, PK, of the first administrator3Is the public key of the first administrator.
Step S24: the second administrator determines a private key and a public key of the second management according to the system public parameter and the fourth secret random number by adopting a secret key generation algorithm, and the specific formula is as follows:
(SK4,PK4)←KGen(Param,β);
wherein, KGen is a secret key generation algorithm, Param is a system public parameter, β is a third secret random number,
Figure BDA0002413001960000073
SK4is a private key, PK, of the second administrator4Is the public key of the second administrator.
Step S3: the sender adopts an encryption algorithm to encrypt according to the system public parameters, the private key of the sender, the public key of the first administrator and the public key of the second administrator to generate a ciphertext, and the method specifically comprises the following steps:
step S31: generating a fifth secret random number according to the system public parameter, the public random number, the private key of the sender and the public key of the first administrator, wherein the specific formula is as follows:
Figure BDA0002413001960000074
where ω is a fifth secret random number, H1() As a hash function in the system common parameter Param, r1To disclose random numbers, PK3Is a public key of a first administrator, SK1To sendThe private key of the party.
Step S32: and encrypting by adopting an encryption algorithm according to the system public parameter, the message, the fifth secret random number, the public key of the second administrator and the public key of the receiver to generate a ciphertext, wherein the specific formula is as follows:
Figure BDA0002413001960000075
where C is the cipher text, Enc is the encryption algorithm, PK4Is a public key, PK, of a second administrator2And the public key of the receiver is omega, the fifth secret random number is m, the message is m, and Param is a system public parameter.
Step S4: the receiving party decrypts by adopting a decryption algorithm according to the system public parameter, the ciphertext and the private key of the receiving party to generate a message, and the method specifically comprises the following steps:
Figure BDA0002413001960000076
where Dec is a decryption algorithm, C is a ciphertext, Param is a system common parameter, SK2Is the private key of the receiver and m is the message.
Step S5: the method for generating the message by the first administrator by adopting a supervision algorithm according to the system public parameter, the public key of the sender, the private key of the first administrator, the ciphertext, the public key of the receiver and the public key of the second administrator specifically comprises the following steps:
step S51: generating a fifth secret random number according to the system public parameter, the public random number, the public key of the sender and the private key of the first administrator, which specifically comprises the following steps:
Figure BDA0002413001960000081
where ω is a fifth secret random number, H1() As a hash function in the system common parameter Param, r1To disclose random numbers, SK3Is a private key, PK, of the first administrator1Is the public key of the sender.
Step S52: and generating a message by adopting a supervision algorithm according to the system public parameter, the fifth secret random number, the ciphertext, the public key of the receiver and the public key of the second administrator, wherein the specific formula is as follows:
m←Supervise1(Param,ω,C);
wherein, Supervise1For the supervision algorithm, Param is a system public parameter, C is a ciphertext, m is a message, ω is a fifth secret random number, and m is a message.
Step S6: the second administrator determines the message according to the system public parameter, the ciphertext and the private key of the second administrator by adopting a supervision algorithm, and the specific formula is as follows:
m←Supervise2(Param,SK4,C);
wherein, Supervise2For the supervision algorithm, Param is the system common parameter, C is the cipher text, SK4Is the second administrator's private key and m is the message.
Example two
Step S1: the first administrator generates system public parameters according to the safety parameters, and the specific formula is as follows:
Param←Initialize(1λ);
wherein 1 isλFor security parameters, Initialize is the initialization algorithm, Param is the system common parameter, Param ═ e, G, H1,H2G × G → GTThe generator of the group G is G, and the hash function H1:{0,1}2n→{0,1}n(ii) a Hash function H2:GT→{0,1}n
Step S2: the method comprises the following steps that a sender, a receiver, a first administrator and a second administrator respectively generate respective private keys and public keys according to system public parameters, and specifically comprises the following steps:
step S21: the sender adopts a secret key generation algorithm, and determines a private key and a public key of the sender according to the system public parameter and the first secret random number, wherein the specific formula is as follows:
(SK1,PK1)←KGen(Param,a);
wherein, KGen is a secret key generation algorithm, Param is a system public parameter, and a is a first secretThe number of the random numbers is determined,
Figure BDA0002413001960000091
SK1is the private key, PK, of the sender1Is the public key of the sender.
Step S22: the receiver adopts a secret key generation algorithm, and determines a private key and a public key of the receiver according to the system public parameter and the second secret random number, wherein the specific formula is as follows:
(SK2,PK2)←KGen(Param,b);
wherein KGen is a secret key generation algorithm, Param is a system public parameter, b is a second secret random number,
Figure BDA0002413001960000092
SK2is a private key, PK, of the receiving party2Is the public key of the recipient.
Step S23: the first administrator determines a private key and a public key of the first administrator according to the system public parameter and the third secret random number by adopting a secret key generation algorithm, and the specific formula is as follows:
(SK3,PK3)←KGen(Param,α);
wherein, KGen is a secret key generation algorithm, Param is a system public parameter, α is a third secret random number,
Figure BDA0002413001960000093
SK3is a private key, PK, of the first administrator3Is the public key of the first administrator.
Step S24: the second administrator determines a private key and a public key of the second management according to the system public parameter and the fourth secret random number by adopting a secret key generation algorithm, and the specific formula is as follows:
(SK4,PK4)←KGen(Param,β);
wherein, KGen is a secret key generation algorithm, Param is a system public parameter, β is a third secret random number,
Figure BDA0002413001960000094
SK4private key for the second administrator,PK4Is the public key of the second administrator.
Step S3: the sender adopts an encryption algorithm to encrypt according to the system public parameters, the private key of the sender, the public key of the first administrator and the public key of the second administrator to generate a ciphertext, and the method specifically comprises the following steps:
step S31: generating a fifth secret random number according to the system public parameter, the public random number, the private key of the sender and the public key of the first administrator, wherein the specific formula is as follows:
Figure BDA0002413001960000095
where ω is a fifth secret random number, H1() As a hash function in the system common parameter Param, r1To disclose random numbers, PK3Is a public key of a first administrator, SK1Is the sender's private key.
Step S32: and encrypting by adopting an encryption algorithm according to the system public parameter, the message, the fifth secret random number, the public key of the second administrator and the public key of the receiver to generate a ciphertext, wherein the specific formula is as follows:
C=(C1,C2,C3,C4);
C1←r1,C2←gω,C3←PK2,
Figure BDA0002413001960000101
wherein C is ciphertext, C1,C2,C3,C4Respectively a first local ciphertext, a second local ciphertext, a third local ciphertext and a fourth local ciphertext, PK4Is a public key, PK, of a second administrator2Is the public key of the receiver, omega is the fifth secret random number, m is the message, H2A hash function in the system public parameter Param, e symmetric bilinear mapping in the system public parameter Param, G a generator of a group G in the system public parameter Param, r1To disclose random numbers.
Step S4: and the receiver adopts a decryption algorithm to generate a message according to the system public parameter, the ciphertext and the private key of the receiver.
Specifically, step S41: the receiving party adopts a decryption algorithm to generate a message according to the system public parameter, the second local ciphertext and the fourth local ciphertext in the ciphertext and the private key of the receiving party, and the method specifically comprises the following steps:
Figure BDA0002413001960000102
wherein H2Is a hash function in the system common parameter Param, e is a symmetric bilinear mapping, PK, of the system common parameter Param4Being a public key of a second administrator, C2Is the second local ciphertext of ciphertext C, C4For the fourth partial ciphertext in ciphertext C, SK2Is the private key of the receiver and m is the message.
Step S5: the method for generating the message by the first administrator by adopting a supervision algorithm according to the system public parameter, the public key of the sender, the private key of the first administrator, the ciphertext, the public key of the receiver and the public key of the second administrator specifically comprises the following steps:
step S51: generating a fifth secret random number according to the system public parameter, the first local ciphertext in the ciphertext, the public key of the sender and the private key of the first administrator, and specifically comprising:
Figure BDA0002413001960000103
where ω is a fifth secret random number, H1() As a hash function in the system common parameter Param, C1For the first partial ciphertext in ciphertext C, SK3Is a private key, PK, of the first administrator1Is the public key of the sender.
Step S52: and generating a message by adopting a supervision algorithm according to the system public parameter, the fifth secret random number, the fourth local ciphertext in the ciphertext, the public key of the receiver and the public key of the second administrator, wherein the specific formula is as follows:
Figure BDA0002413001960000104
wherein, C4Is the fourth partial ciphertext of the ciphertext, H2Is a hash function in the system common parameter Param, e is a symmetric bilinear mapping, PK, of the system common parameter Param4Is the public key of the second administrator, omega is the fifth secret random number, PK2Is the public key of the receiver and m is the message.
Step S6: the second administrator determines a message according to the system public parameter, the ciphertext and a private key of the second administrator by adopting a supervision algorithm; specifically, the method comprises the following steps: the second administrator determines the message according to the system public parameter, the second ciphertext and the fourth local ciphertext in the ciphertext and the private key of the second administrator by adopting a supervision algorithm, and the specific formula is as follows:
Figure BDA0002413001960000111
wherein H2Is a hash function in the system public parameter Param, e is the symmetric bilinear mapping of the system public parameter Param, SK4Is the private key of the second administrator, C2Is the second local ciphertext of ciphertext C, C4Is the fourth local ciphertext, PK, of the ciphertext C2Is the public key of the receiver and m is the message.
The method only uses bilinear pairings, and does not need to use a zero-knowledge proof protocol or hierarchical key distribution, so that the system efficiency and the security are high, and the method can be applied to the field of digital currency supervision or a hierarchical management system.
The invention also discloses a public key encryption and decryption system with double supervisors, as shown in fig. 2, the system comprises:
the system public parameter determining module 1 is used for generating a system public parameter by a first administrator according to the security parameter;
the secret key generation module 2 is used for generating a private key and a public key of each of the sender, the receiver, the first administrator and the second administrator according to the system public parameters respectively;
the encryption module 3 is used for encrypting by the sender according to the system public parameter, the private key of the sender, the public key of the first administrator and the public key of the second administrator by adopting an encryption algorithm to generate a ciphertext;
the decryption module 4 is used for decrypting by the receiver according to the system public parameter, the ciphertext and the private key of the receiver by adopting a decryption algorithm to generate a message;
the first message generation module 5 is used for generating a message by a first administrator according to the system public parameter, the public key of the sender, the private key of the first administrator, the ciphertext, the public key of the receiver and the public key of a second administrator by adopting a supervision algorithm;
and the second message generation module 6 is used for generating a message by a second administrator according to the system public parameter, the ciphertext and the private key of the second administrator by adopting a supervision algorithm.
As an optional implementation manner, the key generation module 2 of the present invention specifically includes:
the first secret key generation unit is used for determining a private key and a public key of the sender according to the system public parameter and the first secret random number by adopting a secret key generation algorithm;
the second secret key generation unit is used for determining a private key and a public key of the receiver according to the system public parameter and the second secret random number by adopting a secret key generation algorithm;
the third secret key generation unit is used for determining a private key and a public key of the first administrator according to the system public parameter and the third secret random number by adopting a secret key generation algorithm by the first administrator;
and the fourth secret key generation unit is used for determining a private key and a public key of the second management according to the system public parameter and the fourth secret random number by adopting a secret key generation algorithm by the second administrator.
As an optional implementation manner, the encryption module 3 of the present invention specifically includes:
the first secret random number generating unit is used for generating a fifth secret random number according to the system public parameter, the public random number, the private key of the sender and the public key of the first administrator;
and the encryption unit is used for encrypting according to the system public parameter, the message, the fifth secret random number, the public key of the second administrator and the public key of the receiver by adopting an encryption algorithm to generate a ciphertext.
As an optional implementation manner, the first message generating module 5 of the present invention specifically includes:
the second secret random number generation unit is used for generating a fifth secret random number according to the system public parameter, the public random number, the public key of the sender and the private key of the first administrator;
and the first message generation unit is used for generating a message according to the system public parameter, the fifth secret random number, the ciphertext, the public key of the receiver and the public key of the second administrator by adopting a supervision algorithm.
Or a second secret random number generation unit, configured to generate a fifth secret random number according to the system public parameter, the first local ciphertext in the ciphertext, the public key of the sender, and the private key of the first administrator;
a first message generating unit for generating a message according to the system public parameter, the fifth secret random number, the fourth local cipher text in the cipher text, the public key of the receiver and the public key of the second administrator by adopting a supervision algorithm
The embodiments in the present description are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
The principles and embodiments of the present invention have been described herein using specific examples, which are provided only to help understand the method and the core concept of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, the specific embodiments and the application range may be changed. In summary, this summary should not be construed to limit the present invention.

Claims (8)

1. A public key encryption and decryption method with double supervisors is characterized by comprising the following steps:
step S1: the first administrator generates system public parameters according to the security parameters;
step S2: the sender, the receiver, the first administrator and the second administrator respectively generate respective private keys and public keys according to the system public parameters;
step S3: the sender adopts an encryption algorithm and encrypts according to the system public parameters, the private key of the sender, the public key of the first administrator and the public key of the second administrator to generate a ciphertext;
step S4: the receiver decrypts by adopting a decryption algorithm according to the system public parameter, the ciphertext and the private key of the receiver to generate a message;
step S5: a first administrator generates a message according to a system public parameter, a public key of a sender, a private key of the first administrator, a ciphertext, a public key of a receiver and a public key of a second administrator by adopting a supervision algorithm;
step S6: and the second administrator adopts a supervision algorithm to generate a message according to the system public parameter, the ciphertext and the private key of the second administrator.
2. The public key encryption and decryption method with dual supervisors according to claim 1, wherein the sender, the receiver, the first administrator and the second administrator respectively generate their own private keys and public keys according to the system public parameters, specifically comprising:
step S21: the sender adopts a secret key generation algorithm, and a private key and a public key of the sender are determined according to the system public parameter and the first secret random number;
step S22: the receiver adopts a secret key generation algorithm, and determines a private key and a public key of the receiver according to the system public parameter and the second secret random number;
step S23: the first administrator determines a private key and a public key of the first administrator according to the system public parameter and the third secret random number by adopting a secret key generation algorithm;
step S24: and the second administrator determines a private key and a public key of the second management according to the system public parameter and the fourth secret random number by adopting a secret key generation algorithm.
3. The public key encryption and decryption method with the dual supervisors according to claim 1, wherein the sender uses an encryption algorithm to encrypt according to the system public parameter, the private key of the sender, the public key of the first administrator and the public key of the second administrator to generate a ciphertext, and specifically comprises:
step S31: generating a fifth secret random number according to the system public parameter, the public random number, the private key of the sender and the public key of the first administrator;
step S32: and encrypting by adopting an encryption algorithm according to the system public parameter, the message, the fifth secret random number, the public key of the second administrator and the public key of the receiver to generate a ciphertext.
4. The public key encryption and decryption method with dual administrators according to claim 1, wherein the first administrator generates messages according to system public parameters, the public key of the sender, the private key of the first administrator, the ciphertext, the public key of the receiver, and the public key of the second administrator by using an administrative algorithm, which specifically comprises:
step S51: generating a fifth secret random number according to the system public parameter, the public random number, the public key of the sender and the private key of the first administrator;
step S52: and generating a message by adopting a supervision algorithm according to the system public parameter, the fifth secret random number, the ciphertext, the public key of the receiver and the public key of the second administrator.
Or step S51: generating a fifth secret random number according to the system public parameter, the first local ciphertext in the ciphertext, the public key of the sender and the private key of the first administrator;
step S52: and generating a message by adopting a supervision algorithm according to the system public parameter, the fifth secret random number, the fourth local ciphertext in the ciphertext, the public key of the receiver and the public key of the second administrator.
5. A public key encryption/decryption system with dual supervisors, the system comprising:
the system public parameter determining module is used for generating a system public parameter by a first administrator according to the security parameter;
the secret key generation module is used for generating a private key and a public key of each of the sender, the receiver, the first administrator and the second administrator according to the system public parameters;
the encryption module is used for encrypting by the sender according to the system public parameter, the private key of the sender, the public key of the first administrator and the public key of the second administrator by adopting an encryption algorithm to generate a ciphertext;
the decryption module is used for decrypting by the receiver according to the system public parameter, the ciphertext and the private key of the receiver by adopting a decryption algorithm to generate a message;
the first message generation module is used for generating a message by a first administrator according to the system public parameter, the public key of the sender, the private key of the first administrator, the ciphertext, the public key of the receiver and the public key of a second administrator by adopting a supervision algorithm;
and the second message generation module is used for generating a message according to the system public parameter, the ciphertext and the private key of the second administrator by adopting a supervision algorithm.
6. The public key encryption and decryption system with dual supervisors according to claim 5, wherein the key generation module specifically comprises:
the first secret key generation unit is used for determining a private key and a public key of the sender according to the system public parameter and the first secret random number by adopting a secret key generation algorithm;
the second secret key generation unit is used for determining a private key and a public key of the receiver according to the system public parameter and the second secret random number by adopting a secret key generation algorithm;
the third secret key generation unit is used for determining a private key and a public key of the first administrator according to the system public parameter and the third secret random number by adopting a secret key generation algorithm by the first administrator;
and the fourth secret key generation unit is used for determining a private key and a public key of the second management according to the system public parameter and the fourth secret random number by adopting a secret key generation algorithm by the second administrator.
7. The public key encryption and decryption system with dual supervisors according to claim 5, wherein the encryption module specifically comprises:
the first secret random number generating unit is used for generating a fifth secret random number according to the system public parameter, the public random number, the private key of the sender and the public key of the first administrator;
and the encryption unit is used for encrypting according to the system public parameter, the message, the fifth secret random number, the public key of the second administrator and the public key of the receiver by adopting an encryption algorithm to generate a ciphertext.
8. The public key encryption and decryption system with dual supervisors according to claim 5, wherein the first message generation module specifically comprises:
the second secret random number generation unit is used for generating a fifth secret random number according to the system public parameter, the public random number, the public key of the sender and the private key of the first administrator;
and the first message generation unit is used for generating a message according to the system public parameter, the fifth secret random number, the ciphertext, the public key of the receiver and the public key of the second administrator by adopting a supervision algorithm.
Or a second secret random number generation unit, configured to generate a fifth secret random number according to the system public parameter, the first local ciphertext in the ciphertext, the public key of the sender, and the private key of the first administrator;
and the first message generation unit is used for generating a message according to the system public parameter, the fifth secret random number, the fourth local ciphertext in the ciphertext, the public key of the receiver and the public key of the second administrator by adopting a supervision algorithm.
CN202010182334.0A 2020-03-16 2020-03-16 Public key encryption and decryption method and system with double monitoring parties Active CN111355578B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010182334.0A CN111355578B (en) 2020-03-16 2020-03-16 Public key encryption and decryption method and system with double monitoring parties

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010182334.0A CN111355578B (en) 2020-03-16 2020-03-16 Public key encryption and decryption method and system with double monitoring parties

Publications (2)

Publication Number Publication Date
CN111355578A true CN111355578A (en) 2020-06-30
CN111355578B CN111355578B (en) 2023-04-11

Family

ID=71196171

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010182334.0A Active CN111355578B (en) 2020-03-16 2020-03-16 Public key encryption and decryption method and system with double monitoring parties

Country Status (1)

Country Link
CN (1) CN111355578B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112532656A (en) * 2021-02-07 2021-03-19 腾讯科技(深圳)有限公司 Block chain-based data encryption and decryption method and device and related equipment
CN113271209A (en) * 2021-04-21 2021-08-17 山东大学 Trustable public key encryption system and method based on non-interactive zero-knowledge proof

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130212377A1 (en) * 2012-02-10 2013-08-15 Behzad Malek Method and System for a Certificate-less Authenticated Encryption Scheme Using Identity-based Encryption
CN107483198A (en) * 2017-09-25 2017-12-15 中国科学院信息工程研究所 A kind of block catenary system supervised and method
CN107733870A (en) * 2017-09-14 2018-02-23 北京航空航天大学 Can be audited accountable anonymity message sink system and method
WO2019209168A2 (en) * 2018-04-26 2019-10-31 华为国际有限公司 Data processing method, related apparatus, and blockchain system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130212377A1 (en) * 2012-02-10 2013-08-15 Behzad Malek Method and System for a Certificate-less Authenticated Encryption Scheme Using Identity-based Encryption
CN107733870A (en) * 2017-09-14 2018-02-23 北京航空航天大学 Can be audited accountable anonymity message sink system and method
CN107483198A (en) * 2017-09-25 2017-12-15 中国科学院信息工程研究所 A kind of block catenary system supervised and method
WO2019209168A2 (en) * 2018-04-26 2019-10-31 华为国际有限公司 Data processing method, related apparatus, and blockchain system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112532656A (en) * 2021-02-07 2021-03-19 腾讯科技(深圳)有限公司 Block chain-based data encryption and decryption method and device and related equipment
CN112532656B (en) * 2021-02-07 2021-05-11 腾讯科技(深圳)有限公司 Block chain-based data encryption and decryption method and device and related equipment
CN113271209A (en) * 2021-04-21 2021-08-17 山东大学 Trustable public key encryption system and method based on non-interactive zero-knowledge proof
CN113271209B (en) * 2021-04-21 2022-06-07 山东大学 Trustable public key encryption system and method based on non-interactive zero-knowledge proof

Also Published As

Publication number Publication date
CN111355578B (en) 2023-04-11

Similar Documents

Publication Publication Date Title
JP2606419B2 (en) Cryptographic communication system and cryptographic communication method
Badra et al. Lightweight and efficient privacy-preserving data aggregation approach for the smart grid
US5796833A (en) Public key sterilization
Khader et al. Preventing man-in-the-middle attack in Diffie-Hellman key exchange protocol
US11870891B2 (en) Certificateless public key encryption using pairings
CN111355578B (en) Public key encryption and decryption method and system with double monitoring parties
Liu et al. A blockchain-based secure cloud files sharing scheme with fine-grained access control
Ouda et al. Security protocols in service-oriented architecture
CN111756722B (en) Multi-authorization attribute-based encryption method and system without key escrow
CN113468582A (en) Anti-quantum computing encryption communication method
EP2395698B1 (en) Implicit certificate generation in the case of weak pseudo-random number generators
Sethia et al. Constant size CP-abe with scalable revocation for resource-constrained IoT devices
Purevjav et al. Email encryption using hybrid cryptosystem based on Android
Naresh et al. Blockchain privacy‐preserving smart contract centric multiple multiparty key agreement over large WANETs
Doshi An enhanced approach for CP-ABE with proxy re-encryption in IoT paradigm
Mishra et al. A certificateless authenticated key agreement protocol for digital rights management system
Wang et al. Public-Key applications in E-commerce
KR20170087120A (en) Certificateless public key encryption system and receiving terminal
JP2010113181A (en) Key management method, key generation method, encryption processing method, decryption processing method, access control method, communication network system
Raj et al. Traitor Tracing in Broadcast Encryption using Vector Keys
Yuen et al. Towards a cryptographic treatment of publish/subscribe systems
Harn et al. Authenticated group key distribution scheme for a large distributed network
Yoon et al. Cryptanalysis of two user identification schemes with key distribution preserving anonymity
Kalyani et al. STUDY OF CRYPTOLOGY AND ITS FORMS IN TODAY'S SECURE WORLD.
Indla et al. Extended Group Key Transfer Protocol for Authentication Using DES based on Secret Sharing in Cloud

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20201224

Address after: 100085 no.054, Room 201, north side, second floor, No.36 Haidian West Street, Haidian District, Beijing

Applicant after: Macy Technology (Beijing) Co.,Ltd.

Address before: 100085 Room 201, north side, 2nd floor, 36 Haidian West Street, Haidian District, Beijing

Applicant before: Beijing Chain Technology Co.,Ltd.

GR01 Patent grant
GR01 Patent grant